|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5777 occurrences of 2201 keywords
|
|
|
Results
Found 13353 publication records. Showing 13353 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
31 | Markus Rückert, Dominique Schröder |
Security of Verifiably Encrypted Signatures and a Construction without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings, pp. 17-34, 2009, Springer, 978-3-642-03297-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 |
Universal Designated Verifier Signatures with Threshold-Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings, pp. 89-109, 2009, Springer, 978-3-642-04845-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Peng Ning, An Liu, Wenliang Du |
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 4(1), pp. 1:1-1:35, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, Sensor networks, broadcast authentication, DoS attacks |
31 | Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu |
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 82-96, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu 0001 |
Compact E-Cash from Bounded Accumulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 178-195, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
compact e-cash, bounded accumulator, bilinear pairings |
31 | Ilya Mironov |
Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 140-156, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
TCR, UOWHF, Cramer-Shoup, PSS-RSA, signatures, DSA, collision-resistance |
31 | Chik How Tan |
Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 292-307, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, public key encryption, bilinear map |
31 | Tianjie Cao, Dongdai Lin, Rui Xue 0001 |
Universal Designated-Verifier Proxy Blind Signatures for E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 1036-1041, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Sherman S. M. Chow, Willy Susilo |
Generic Construction of (Identity-Based) Perfect Concurrent Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 194-206, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Perfect Ambiguity, Bilinear Pairing, Fair-Exchange, Ring Signatures, Identity-based Signatures, Concurrent Signatures |
31 | Ernest F. Brickell, Jan Camenisch, Liqun Chen 0002 |
Direct anonymous attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 132-145, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
integrity based computing, privacy, cryptographic protocols, trusted computing, anonymous credential systems |
31 | Yi Mu 0001, Fangguo Zhang, Willy Susilo |
Deniable Partial Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2004, Higher-Level Decision Making, 9th Asian Computing Science Conference, Dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand, December 8-10, 2004, Proceedings, pp. 182-194, 2004, Springer, 3-540-24087-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef Pieprzyk |
Universal Designated-Verifier Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 523-542, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Gene Tsudik, Shouhuai Xu |
Accumulating Composites and Improved Group Signing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 269-286, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Feng Bao 0001, Robert H. Deng |
A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 1-11, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
e-commerce, traceability, blinding signatures, anonymity revocation |
31 | Jacques Traoré |
Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 228-243, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
31 | Gustavus J. Simmons |
Subliminal Communication is Easy Using the DSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, pp. 218-232, 1993, Springer, 3-540-57600-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
31 | Sebastian Schmerl, Michael Vogel, Hartmut König |
Identifying Modeling Errors in Signatures by Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPIN ![In: Model Checking Software, 16th International SPIN Workshop, Grenoble, France, June 26-28, 2009. Proceedings, pp. 205-222, 2009, Springer, 978-3-642-02651-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Attack Signatures, Intrusion Detection, Computer Security, Signature Verification, Misuse Detection, Promela, Spin model checker |
31 | Jin Li 0002, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong |
Generic Security-Amplifying Methods of Ordinary Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 224-241, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Weak Chosen Message Attack, q-SDH Assumption, Signature, Strong-RSA Assumption, Strong Unforgeability |
31 | Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Delegation Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 99-115, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Delegation network, bilinear pairings, proxy signature, identity-based cryptography, batch verification |
31 | Silvio Micali, Kazuo Ohta, Leonid Reyzin |
Accountable-subgroup multisignatures: extended abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 245-254, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
digital signature, multisignature |
31 | Chin-Chen Chang 0001, Iuon-Chang Lin |
Cryptanalysis of the Improved User Efficient Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 42-46, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
cryptography, Blind signature |
31 | Smriti Kumar Sinha, Azzedine Benameur |
A formal solution to rewriting attacks on SOAP messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 5th ACM Workshop On Secure Web Services, SWS 2008, Alexandria, VA, USA, October 31, 2008, pp. 53-60, 2008, ACM, 978-1-60558-292-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
context-free signature, context-sensitive signature, regular tree grammar, xml rewriting attacks, security, formal methods, soap |
31 | Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao 0001 |
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 43-60, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Designated Confirmer Signature, Digital Signature, Fair Exchange |
31 | Qianhong Wu, Bo Qin, Yumin Wang |
Extended Methodology of RS Design and Instances Based on GIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 20(2), pp. 270-275, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
knowledge signature, graph isomorphism problem, ring signature |
31 | Guilin Wang, Sihan Qing |
Security Flaws in Several Group Signatures Proposed by Popescu. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part III, pp. 711-718, 2005, Springer, 3-540-25862-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
digital signature, information security, group signature |
31 | Mohamed Al-Ibrahim, Anton Cerný |
Proxy and Threshold One-Time Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 123-136, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
digital signatures, group signatures, proxy signature, threshold cryptography, broadcast authentication, One-time signature |
31 | Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma |
Efficient Public Auction with One-Time Registration and Public Verifiability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 162-174, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
public auction, English auction, one-time registration, signature of knowledge, anonymous signature scheme, anonymity, hash chain, public verifiability |
31 | Rosa Rodríguez-Montañés, Joan Figueras |
Bridges in sequential CMOS circuits: current-voltage signatur. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 15th IEEE VLSI Test Symposium (VTS'97), April 27-May 1, 1997, Monterey, California, USA, pp. 68-73, 1997, IEEE Computer Society, 0-8186-7810-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
sequential CMOS circuits, current-voltage signature, I/sub DDQ/-V/sub DD/ signature, control loop nodes, fault diagnosis, fault diagnosis, temperature dependence, bridging defects |
31 | Manoj Franklin, Kewal K. Saluja, Kyuchull Kim |
Fast computation of MISR signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: 8th International Conference on VLSI Design (VLSI Design 1995), 4-7 January 1995, New Delhi, India, pp. 414-418, 1995, IEEE Computer Society, 0-8186-6905-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
MISR signatures, fast computation, test response compression, multi-input signature registers, equivalent single input circuit, logic testing, design for testability, logic design, table lookup, table lookups, shift registers, binary sequences, speedup technique, signature analyzers |
30 | D. S. Guru, H. N. Prakash |
Online Signature Verification and Recognition: An Approach Based on Symbolic Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 31(6), pp. 1059-1073, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Xu An Wang 0001, Xiaoyuan Yang 0002, Qingquan Peng |
On Security Notions for Verifiably Encrypted Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 37-40, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Randy Smith, Neelam Goyal, Justin Ormont, Karthikeyan Sankaralingam, Cristian Estan |
Evaluating GPUs for network packet signature matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPASS ![In: IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2009, April 26-28, 2009, Boston, Massachusetts, USA, Proceedings, pp. 175-184, 2009, IEEE Computer Society, 978-1-4244-4184-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Sven Schäge |
Twin Signature Schemes, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 104-117, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 |
Ring Signature with Weak Linkability and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 20(8), pp. 1145-1148, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Byung-Chul Park, Young J. Won, Myung-Sup Kim, James W. Hong |
Towards automated application signature generation for traffic identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 160-167, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Tao Huang, Qihai Zhou, Le Zhang, Zhongjun Li, Xun Lin |
An Improved Scheme for E-signature Techniques Based on Digital Encryption and Information Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIP ![In: International Symposium on Information Processing, ISIP 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, WMWA 2008, Moscow, Russia, 23-25 May 2008, pp. 593-597, 2008, IEEE Computer Society, 978-0-7695-3151-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Hung-Yu Chien |
Highly Efficient ID-Based Ring Signature from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 829-834, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Wei Gao 0007, Guilin Wang, Xueli Wang, Fei Li 0006 |
One-Round ID-Based Blind Signature Scheme without ROS Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings, pp. 316-331, 2008, Springer, 978-3-540-85503-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Muhammad Talal Ibrahim, Matthew J. Kyan, Ling Guan |
On-line Signature Verification Using Most Discriminating Features and Fisher Linear Discriminant Analysis (FLD). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: Tenth IEEE International Symposium on Multimedia (ISM2008), December 15-17, 2008, Berkeley, California, USA, pp. 172-177, 2008, IEEE Computer Society, 978-0-7695-3454-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Takuya Yoshida, Koji Okada |
Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings, pp. 83-99, 2008, Springer, 978-3-540-89597-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Xiaofeng Wang, Liang Cao, Shangping Wang, Yaling Zhang |
ID-Based Convertible Limited (Multi-)Verifier Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 774-777, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Jiang Han, Qiuliang Xu, Guohua Chen |
Efficient ID-based Threshold Ring Signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 437-442, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Maryam Moghadam Fard, Mehdi Moghadam Fard, Nasser Mozayani |
A new on-line signature verification by Spatio-Temporal neural network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 233-235, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Luk Bettale, Jean-Charles Faugère, Ludovic Perret |
Cryptanalysis of the TRMS Signature Scheme of PKC'05. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 143-155, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng |
Certificateless signature: a new security model and an improved generic construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 42(2), pp. 109-126, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
30 | Johannes Buchmann 0001, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume |
Merkle Signatures with Virtually Unlimited Signature Capacity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 31-45, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SSL, post-quantum cryptography, Merkle signatures |
30 | Fengying Li, Qingshui Xue, Zhenfu Cao |
Crypanalysis of Kuo and Chen's Threshold Proxy Signature Scheme Based on the RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 815-818, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Ji-Seon Lee, Jik Hyun Chang |
Generating a Proxy Signature on a Confidential Message. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 971, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Chengyu Hu, Daxing Li |
Ring Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 869-871, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Yu Qiao 0001, Jianzhuang Liu, Xiaoou Tang |
Offline Signature Verification Using Online Handwriting Registration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 18-23 June 2007, Minneapolis, Minnesota, USA, 2007, IEEE Computer Society, 1-4244-1179-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Benoît Chevallier-Mames, Marc Joye |
A Practical and Tightly Secure Signature Scheme Without Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 339-356, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | W. Chang, J. Shin |
Modified Dynamic Time Warping for Stroke-Based On-line Signature Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 9th International Conference on Document Analysis and Recognition (ICDAR 2007), 23-26 September, Curitiba, Paraná, Brazil, pp. 724-728, 2007, IEEE Computer Society, 978-0-7695-2822-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Daigo Muramatsu, Mitsuru Kondo, Masahiro Sasaki, Satoshi Tachibana, Takashi Matsumoto 0001 |
A Markov chain Monte Carlo algorithm for bayesian dynamic signature verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(1), pp. 22-34, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Kota Iwamoto, Eiji Kasutani, Akio Yamada |
Image Signature Robust to Caption Superimposition for Video Sequence Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 3185-3188, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Abdullah I. Al-Shoshan |
Handwritten Signature Verification Using Image Invariants and Dynamic Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGIV ![In: Third International Conference on Computer Graphics, Imaging and Visualization (CGIV 2006), 26-28 July 2006, Sydney, Australia, pp. 173-176, 2006, IEEE Computer Society, 0-7695-2606-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Jianhong Zhang, Wei Zou |
Linkability of Two Blind Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (1) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 468-471, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Tianqi Zhang, Zengshan Tian, Zhengzhong Zhou, Yujun Kuang |
A Neural Network Method for Blind Signature Waveform Estimation of Synchronous CDMA Signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28 - June 1, 2006, Proceedings, Part II, pp. 694-699, 2006, Springer, 3-540-34437-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001 |
Simplifying Signature Engineering by Reuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 436-450, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Attack Signatures, Intrusion Detection, Computer Security, Misuse Detection |
30 | Kaoru Kurosawa, Katja Schmidt-Samoa |
New Online/Offline Signature Schemes Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 330-346, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Online/offline signatures, trapdoor hash, division intractability, strong RSA assumption |
30 | Ian F. Blake, Aldar C.-F. Chan |
Conditionally Verifiable Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 206-220, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Miaomiao Zhang, Gongliang Chen, Jianhua Li 0001 |
Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 135-141, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Certificateless Designated Verifier Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 15-19, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Designated Verifier, Gap Bilinear Diffie-Hellman Problem, Certificateless Cryptography |
30 | Young Woon Woo, Soowhan Han, Kyung Shik Jang |
Off-Line Signature Verification Based on Directional Gradient Spectrum and a Fuzzy Classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PSIVT ![In: Advances in Image and Video Technology, First Pacific Rim Symposium, PSIVT 2006, Hsinchu, Taiwan, December 10-13, 2006, Proceedings, pp. 1018-1029, 2006, Springer, 3-540-68297-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Hong Wang, Yuqing Zhang, Dengguo Feng |
Short Threshold Signature Schemes Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings, pp. 297-310, 2005, Springer, 3-540-30805-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Jongin Lim 0001, Kilsoo Chun |
Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II, pp. 381-390, 2005, Springer, 3-540-25861-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Wei Lu, Kenneth Chiu, Aleksander Slominski, Dennis Gannon |
A streaming validation model for SOAP digital signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 14th IEEE International Symposium on High Performance Distributed Computing, HPDC-14, Research Triangle Park, North Carolina, USA, 24-27 July 2005, pp. 243-252, 2005, IEEE Computer Society, 0-7803-9037-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Zhenjie Huang, Dan Chen, Yumin Wang |
Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 67-71, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Shaobin Wang, Fan Hong, Guohua Cui |
Secure Efficient Proxy Blind Signature Schemes Based DLP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 452-455, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Dit-Yan Yeung, Hong Chang, Yimin Xiong, Susan E. George, Ramanujan S. Kashi, Takashi Matsumoto 0001, Gerhard Rigoll |
SVC2004: First International Signature Verification Competition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICBA ![In: Biometric Authentication, First International Conference, ICBA 2004, Hong Kong, China, July 15-17, 2004, Proceedings, pp. 16-22, 2004, Springer, 3-540-22146-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Javier Herranz, Germán Sáez |
Revisiting Fully Distributed Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, pp. 356-370, 2004, Springer, 3-540-24130-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Tianjie Cao, Dongdai Lin, Rui Xue 0001 |
Improved Privacy-Protecting Proxy Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWCC ![In: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings, pp. 208-213, 2004, Springer, 3-540-23898-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Dae Jong Lee, Keun Chang Kwak, Jun Oh Min, Myung-Geun Chun |
Multi-modal Biometrics System Using Face and Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part IV, pp. 828-837, 2004, Springer, 3-540-22060-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Dae Jong Lee, Keun Chang Kwak, Jun Oh Min, Myung-Geun Chun |
Multi-modal Biometrics System Using Face and Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 635-644, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Qingshui Xue, Zhenfu Cao |
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Second InternationalSymposium, ISPA 2004, Hong Kong, China, December 13-15, 2004, Proceedings, pp. 715-724, 2004, Springer, 3-540-24128-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn |
A Certificate-Based Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 99-111, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Mayank Vatsa, Richa Singh 0001, Pabitra Mitra, Afzel Noore |
Signature Verification Using Static and Dynamic Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP ![In: Neural Information Processing, 11th International Conference, ICONIP 2004, Calcutta, India, November 22-25, 2004, Proceedings, pp. 350-355, 2004, Springer, 3-540-23931-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Kemal Bicakci, Nazife Baykal |
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers, pp. 187-200, 2003, Springer, 3-540-20887-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Vanesa Daza, Javier Herranz, Germán Sáez |
Some Protocols Useful on the Internet from Threshold Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 359-363, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Juan J. Igarza, Iñaki Goirizelaia, Koldo Espinosa, Inmaculada Hernáez, Raúl Méndez, Jon Sánchez |
Online Handwritten Signature Verification Using Hidden Markov Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIARP ![In: Progress in Pattern Recognition, Speech and Image Analysis, 8th Iberoamerican Congress on Pattern Recognition, CIARP 2003, Havana, Cuba, November 26-29, 2003, Proceedings, pp. 391-399, 2003, Springer, 3-540-20590-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Joseph K. Liu, Victor K. Wei, Duncan S. Wong |
A Separable Threshold Ring Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 12-26, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Javier Herranz, Germán Sáez |
Forking Lemmas for Ring Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 266-279, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Burton S. Kaliski Jr. |
On Hash Function Firewalls in Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 1-16, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Robert Johnson, David Molnar, Dawn Xiaodong Song, David A. Wagner 0001 |
Homomorphic Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 244-262, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
30 | S. H. Supangkat, T. Eric, A. S. Pamuji |
A public key signature for authentication in telephone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APCCAS (2) ![In: IEEE Asia Pacific Conference on Circuits and Systems 2002, APCCAS 2002, Singapore, 16-18 December 2002, pp. 495-498, 2002, IEEE, 0-7803-7690-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Hikaru Morita, D. Sakamoto, Tetsu Ohishi, Yoshimitsu Komiya, Takashi Matsumoto 0001 |
On-Line Signature Verifier Incorporating Pen Position, Pen Pressure, and Pen Inclination Trajectories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVBPA ![In: Audio- and Video-Based Biometric Person Authentication, Third International Conference, AVBPA 2001 Halmstad, Sweden, June 6-8, 2001, Proceedings, pp. 318-323, 2001, Springer, 3-540-42216-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
30 | W. Sardha Wijesoma, K. W. Yue, K. L. Chien, T. K. Chow |
Online Handwritten Signature Verification for Electronic Commerce over the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence ![In: Web Intelligence: Research and Development, First Asia-Pacific Conference, WI 2001, Maebashi City, Japan, October 23-26, 2001, Proceedings, pp. 227-236, 2001, Springer, 3-540-42730-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
30 | Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou |
Threshold Undeniable RSA Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 221-232, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
30 | Bin-Hong Lin, Shao-Hui Shieh, Cheng-Wen Wu |
A fast signature computation algorithm for LFSR and MISR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 19(9), pp. 1031-1040, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
30 | François Grieu |
A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, pp. 70-80, 2000, Springer, 3-540-67517-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
30 | Klaus Echtle |
Avoiding Malicious Byzantine Faults by a New Signature Generation Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC ![In: Dependable Computing - EDCC-3, Third European Dependable Computing Conference, Prague, Czech Republic, September 15-17, 1999, Proceedings, pp. 106-123, 1999, Springer, 3-540-66483-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Malicious Byzantine Faults, Digital Signatures for Fault Tolerance, Agreement Protocols |
30 | Willy Susilo, Reihaneh Safavi-Naini, Josef Pieprzyk |
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 103-116, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
30 | Feng Bao 0001, Robert H. Deng |
A Signcryption Scheme with Signature Directly Verifiable by Public Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 55-59, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
30 | Narn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang |
On Zhang's Nonrepudiable Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 415-422, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
30 | Jan Camenisch, Markus Stadler |
Efficient Group Signature Schemes for Large Groups (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 410-424, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
30 | Hiroyuki Kitagawa, Noriyasu Watanabe, Yoshiharu Ishikawa |
Design and Evaluation of Signature File Organization Incorporating Vertical and Horizontal Decomposition Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 7th International Conference, DEXA '96, Zurich, Switzerland, September 9-13, 1996, Proceedings, pp. 875-888, 1996, Springer, 3-540-61656-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
30 | David Pointcheval, Jacques Stern |
Provably Secure Blind Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings, pp. 252-265, 1996, Springer, 3-540-61872-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
30 | Jörg Schwenk, Jörg Eisfeld |
Public Key Encryption and Signature Schemes Based on Polynomials over Zn. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding, pp. 60-71, 1996, Springer, 3-540-61186-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
30 | Cynthia Dwork, Moni Naor |
An Efficient Existentially Unforgeable Signature Scheme and its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings, pp. 234-246, 1994, Springer, 3-540-58333-5. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
30 | Yoshiharu Ishikawa, Hiroyuki Kitagawa, Nobuo Ohbo |
Evaluation of Signature Files as Set Access Facilities in OODBs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, Washington, DC, USA, May 26-28, 1993., pp. 247-256, 1993, ACM Press, 978-0-89791-592-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
30 | Amy Moormann Zaremski, Jeannette M. Wing |
Signature Matching: A Key to Reuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGSOFT FSE ![In: Proceedings of the First ACM SIGSOFT Symposium on Foundations of Software Engineering, SIGSOFT 1993, Los Angeles, California, USA, December 7-10, 1993, pp. 182-190, 1993, ACM, 978-0-89791-625-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 13353 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|